Do awesome stuff - awesomely.

The static site generator Octopress is surrounded by a large community, which has generated a large variety of themes for it.
Many developers use actual blogs as theme previews, which - as Octopress bloggers are avid hackers - contain many customizations.
Thus, users (newer ones in particular) are oft disappointed by the unexpectedly low amount of chrome they see on their website upon deployment of the default theme.
Some developers maintain an empty demo site with the default theme, instead - a passable solution - which, however, takes up quite a bit of time (due to the need to update both Octopress and the theme - manually - on yet another site).

To make maintaining true-to-the-default demos easier for developers, we present Theme-Space - a GitHub-based repository for Octopress theme previews.

Pop-science is currently no topic to overlook on social media.
Websites or social media groups sharing factoids or infographics amass millions of likes and receive a high number of content re-shares.
In parallel, pop-science magazines also attract many readers and have a strong online presence.
The scientific readership routinely recognizes pop-science reporting as inaccurate, misleading, or even outright wrong.
Oblivious to most science reporters’ lack of insight laymen may instead wonder:
Why does technology not deliver upon the promises made by pop-science?
or Why are pop-science reports so inconsistent?
The answer to both questions is plainly: very bad journalism.
However, instead of reflecting badly on its authors, sub-par pop-science undermines the credibility of research: creating the impression that science overreaches and cannot deliver, or that there is gross disagreement in the scientific community - even when there is little.

We assume that this incorrect appraisal is based on a series of misconceptions about what science news actually constitute, and we present a brief theoretical explanation of how one should best contextualize science journalism.

Octopress is one of the most widely used static site generators, and as such attracts a large number of bloggers.
With the advent of increasing smartphone and tablet based internet usage, authors in general and bloggers in particular adapt their habits to write and publish on the go.
Most modern content management systems provide ample possibilities for mobile publishing - static site generators, however, typically do not.

This is a consequence of the infrastructure requirements that static site generation places on a system (in case of Octopress these being at least Ruby and a number of Ruby gems - possibly also Git), and the fact that most mobile platforms cannot yet meet them.
The different paradigm of static site publishing thus also mandates a different approach to remote blogging.
Here we present a 2-element (sync & inotify-triggered scripts) automatic solution for remote Octopress blogging, and a short section on remote content authoring (sans publication) via GitHub.

Bracketed pictures are commonly taken to enhance the dynamic range (and sometimes the sharpness) of a photographic scene.
The former type of bracketing is also known as exposure bracketing, and is what we will be dealing with in this article.
There are many software products offering this functionality, including but not limited to Hugin, digiKam and Adobe Photoshop.
A major drawback of these programs, however, is that they are designed mainly for graphical interface use; and will have you click through their interface for every set of bracketed images you wish to stack.
Here we present a rapid and easily-batchable way to stack your exposure bracketed images via a one-liner from the command line.

Risk is a board game, variations of which can also be played online, as for instance on Dominating12, Conquer Club, or MajorCommand.
Though the gameplay mechanism is consistent, there are many variations between these websites - occasionally extending even to the rule terminology.
As a general reference therefor we would recommend the succinct Dominating12 terminology glossary.

While we try to accommodate for rule variations in the following instructions, please be aware that they are meant specifically for 2-player (1v1) games (optimal gameplay is very different for multiplayer games).
We follow the most popular battle mechanism, where the attacker rolls up to 3 and the defender up to 2 dice (with the defender winning ties).
Our notation for attack configurations is AvD, with A being the number of attackers (troops on the attacking territory minus one) and D being the number of defenders (total troops on the defending territory).

In Risk-like games, players face off against each other on maps divided into territories.
One player may conquer the territories of another by eliminating all of the other’s units from a said territory.
Units can be eliminated with the throwing of the dice, and a unit is lost for every instance where the attacking player has a higher score on one cast die.
The throwing of the die is governed by the following rules:

The defender rolls a maximum of 2 dice (one per unit - contingent on the unit number on the attacked territory).

The attacker rolls a maximum of 3 dice (one per unit - excluding the last unit and contingent on the unit number on the attacking territory).

Only the top dice are considered if a player throws more dice than his opponent.

Dice are paired with each other in an ordinal fashion.

There are already texts providing more wide-ranging whole-battle predictions (as for instance here), and closed-source (and in many cases, also inaccurate) battle simulators.
Here we try to offer a transparent formulaic reference and odds table for all single-attack scenarios.

Model release forms help photographers secure the freedom to publish and sell their photography work.
One common issue with model release forms (especially in the context of informal photo sessions) is that they are tailored to the practice of professional photography, and commonly grant the photographer all rights to all pictures they may have taken of the model.
While for professional models this might not be an issue, for relatives, friends, and acquaintances of the photographer such a commitment becomes daunting.

Here we present a model release form concept based on encryption technology which you can use to transfer rights for single photographs.

Tarballs (a term for .tar archives) are a common medium for installing the Gentoo Linux operating system.
The standard Gentoo installation starts with a non-bootable “stage 3” tarball, which includes only very limited software.
As discussed in a previous article, on the Raspberry Pi - and other embedded systems - it is in certain respects better to start off with a bootable (and wifi-capable) tarball.

For these purposes we are publishing a stage 4 tarball with all the basic software you need on the Raspberry Pi - including the sys-kernel/linux-firmware package for broad wifi-device support and a Git repository for customizing and deploying the newest Raspberry Pi kernel sources from upstream.
Though the archives total under 1 GB in size, we recommend you use at least an 8 GB SD card for use with your Raspberry Pi.

Gentoo is a Linux distribution which excels at flexibility and recommends itself for easy customization.
These qualities make it especially well-suited for scientific computing or for dedicated systems.
The Raspberry Pi is one of the most popular (though not the only - see Cubieboard as an alternate example) single-board computers to date, and is often deployed for dedicated tasks: scientific computing, home automation, etc.

Installing Gentoo on a dedicated platform makes it easy for the user to strip down his system to suit his needs precisely - e.g. in the guise of an ultra-minimalist installation.
Here we provide an overview of current means of installing Gentoo on your Raspberry Pi.

Stage 4 tarballs are bootable, fully working, self-sufficient Gentoo Linux distributions.
They include a complete Gento environment, which you can directly boot up and use.

Stage 4 tarballs are very well suited for system backups or use cases where chrooting and emerging your basic system requirements can become very tedious.
Situations in which stage 3 installation is difficult include:

Installing Gentoo on machines with limited resources for compilation (e.g. many ARM family platforms)

Installing Gentoo for machines which do not support standard live CD/USB distributions